Följ
Shouling Ji
Shouling Ji
Zhejiang University & Georgia Institute of Technology
Verifierad e-postadress på gatech.edu - Startsida
Titel
Citeras av
Citeras av
År
Textbugger: Generating adversarial text against real-world applications
J Li, S Ji, T Du, B Li, T Wang
arXiv preprint arXiv:1812.05271, 2018
3362018
Dual encoding for zero-example video retrieval
J Dong, X Li, C Xu, S Ji, Y He, G Yang, X Wang
Proceedings of the IEEE/CVF conference on computer vision and pattern …, 2019
1972019
{MOPT}: Optimized mutation scheduling for fuzzers
C Lyu, S Ji, C Zhang, Y Li, WH Lee, Y Song, R Beyah
28th USENIX Security Symposium (USENIX Security 19), 1949-1966, 2019
1302019
Model-reuse attacks on deep learning systems
Y Ji, X Zhang, S Ji, X Luo, T Wang
Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018
1252018
{SecGraph}: A Uniform and Open-source Evaluation System for Graph Data Anonymization and De-anonymization
S Ji, W Li, P Mittal, X Hu, R Beyah
24th USENIX Security Symposium (USENIX Security 15), 303-318, 2015
1252015
Structural data de-anonymization: Quantification, practice, and implications
S Ji, W Li, M Srivatsa, R Beyah
Proceedings of the 2014 ACM SIGSAC conference on computer and communications …, 2014
1252014
Certchain: Public and efficient certificate audit based on blockchain for tls connections
J Chen, S Yao, Q Yuan, K He, S Ji, R Du
IEEE INFOCOM 2018-IEEE Conference on Computer Communications, 2060-2068, 2018
1142018
Graph data anonymization, de-anonymization attacks, and de-anonymizability quantification: A survey
S Ji, P Mittal, R Beyah
IEEE Communications Surveys & Tutorials 19 (2), 1305-1326, 2016
1102016
Differentially private releasing via deep generative model (technical report)
X Zhang, S Ji, T Wang
arXiv preprint arXiv:1801.01594, 2018
1042018
Deepsec: A uniform platform for security analysis of deep learning model
X Ling, S Ji, J Zou, J Wang, C Wu, B Li, T Wang
2019 IEEE Symposium on Security and Privacy (SP), 673-690, 2019
1032019
On Your Social Network De-anonymizablity: Quantification and Large Scale Evaluation with Seed Knowledge.
S Ji, W Li, NZ Gong, P Mittal, RA Beyah
NDSS, 2015
1032015
Interpretable deep learning under fire
X Zhang, N Wang, H Shen, S Ji, X Luo, T Wang
29th {USENIX} Security Symposium ({USENIX} Security 20), 2020
1022020
Temporal multi-graph convolutional network for traffic flow prediction
M Lv, Z Hong, L Chen, T Chen, T Zhu, S Ji
IEEE Transactions on Intelligent Transportation Systems 22 (6), 3337-3348, 2020
782020
Optimal distributed data collection for asynchronous cognitive radio networks
Z Cai, S Ji, J He, AG Bourgeois
2012 IEEE 32nd international conference on distributed computing systems …, 2012
712012
Sirenattack: Generating adversarial audio for end-to-end acoustic systems
T Du, S Ji, J Li, Q Gu, T Wang, R Beyah
Proceedings of the 15th ACM Asia Conference on Computer and Communications …, 2020
702020
Structure based data de-anonymization of social networks and mobility traces
S Ji, W Li, M Srivatsa, JS He, R Beyah
International Conference on Information Security, 237-254, 2014
702014
Constructing load-balanced data aggregation trees in probabilistic wireless sensor networks
J He, S Ji, Y Pan, Y Li
IEEE Transactions on Parallel and Distributed Systems 25 (7), 1681-1690, 2013
652013
Graph backdoor
Z Xi, R Pang, S Ji, T Wang
30th USENIX Security Symposium (USENIX Security 21), 1523-1540, 2021
602021
Snapshot and continuous data collection in probabilistic wireless sensor networks
S Ji, R Beyah, Z Cai
IEEE Transactions on Mobile Computing 13 (3), 626-637, 2013
602013
Zero-sum password cracking game: A large-scale empirical study on the crackability, correlation, and security of passwords
S Ji, S Yang, X Hu, W Han, Z Li, R Beyah
IEEE transactions on dependable and secure computing 14 (5), 550-564, 2015
572015
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20